Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding... [more]
Although program management has received much attention in recent books, program governance remains a relatively new subject.... [more]
Details time-efficient and cost-effective strategies to evaluate, select, prioritize, plan, and manage multiple projects.... [more]
Although there are countless books on statistics, few are dedicated to the application of statistical methods to software... [more]
Traditional methods for handling spatial data are encumbered by the assumption of separate origins for horizontal and vertical... [more]
Covers model theory, practice, and presentation. This book describes the need for model creation and demonstrates how to create... [more]
When you invest in expensive technology and systems, you want to get the most out of them. Process improvement has been used... [more]
Knowledge management is the identification and analysis of available and required knowledge, and the subsequent planning and... [more]
Recognizes synergies among component pieces of strategic intelligence, and demonstrates how executives can use this information... [more]
Shows how to strategically maximize a limited security budget without compromising the quality of risk management initiatives.... [more]
This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards... [more]
This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy... [more]
A valuable, practical guide for navigating through ICT turbulence and dynamics. A lighthouse for the human side of ICT.<br... [more]
Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its... [more]
Revised edition of the author's Implementing digital forensic readiness,  [more]
With more than three decades of experience as a thought-leader and expert practitioner, PMI Fellow Dr. David Hillson shares... [more]
Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is... [more]
With all signs pointing to an increased use of and interest in project-based work in modern organizations, the better scholars... [more]
This book looks at various application and data demand drivers, along with data infrastructure options from legacy on premise,... [more]
Accounting for the rapid and often confusing changes currently underway in the information systems of organizations, such... [more]
Project Management covers the full range of issues of vital concern to IT managers working in today's hurry-up, budget-conscious... [more]
This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient... [more]
Business managers have long known the power of the Balanced Scorecard in executing corporate strategy. Implementing the Project... [more]
This book presents a framework to model the main activities of information security management and governance. The same model... [more]
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database... [more]